16
Ethical Hacking By White Hat Hackers

Ethical hacking - Good Aspect of Hacking

Embed Size (px)

DESCRIPTION

Ethical Hacking Is another aspect of hacking. Like every coin has 2 sides, Ethical Hacking is good one. As Hacker is someone who seeks and exploits weaknesses in a computer system or computer network, but Ethical Hacking is against the bad or black hat Hackers. Ethical Hacker can also known as White Hat Hacker. Ethical Hacking is Legal, its Permission is obtained from the target, its Part of an overall security program. By Techwila http://www.techwila.com

Citation preview

Page 1: Ethical hacking - Good Aspect of Hacking

Ethical Hacking

By White Hat Hackers

Page 2: Ethical hacking - Good Aspect of Hacking

What Hackers Do?

Hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. 

 Hackers were mainly of 2 types: White Hat Hacker Grey Hat Hacker Black Hat Hacker

Page 3: Ethical hacking - Good Aspect of Hacking

www.atariarchives.org/deli/hacker_ethics.php

Page 4: Ethical hacking - Good Aspect of Hacking

Hacking in this case:

You make a system do what it doesn’t do out of the box.

You built upon structures that are already in place.

Page 5: Ethical hacking - Good Aspect of Hacking

What is Ethical Hacking

It is Legal Permission is obtained from the target Part of an overall security program Identify vulnerabilities visible from Internet at particular point of time Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner 

Page 6: Ethical hacking - Good Aspect of Hacking

White Hat Hackers

 Also Known as Ethical Hacker. A Ethical Hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a Intelligence agencies and cyber warfare operatives of nation states, security company which makes security software.

This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement.

The EC-Council, also known as the International Council of Electronic Commerce Consultants, is one of those organisations that have developed certifications, courseware, classes, and online training covering the diverse arena of Ethical Hacking.

Page 7: Ethical hacking - Good Aspect of Hacking

Ethical Hacking - Process

1. Preparation2. Foot printing3. Enumeration & Fingerprinting4. Identification of Vulnerabilities5. Attack – Exploit the Vulnerabilities

Page 8: Ethical hacking - Good Aspect of Hacking

Ethical Hacking - Commandments

Working Ethically Trustworthiness Misuse for personal gain

Respecting PrivacyNot Crashing the Systems

Page 9: Ethical hacking - Good Aspect of Hacking

Why – Ethical Hacking

Viruses, Trojan Horses,

and Worms

SocialEngineering

AutomatedAttacks

Accidental Breaches in

Security Denial ofService (DoS)

OrganizationalAttacks

RestrictedData

Protection from possible External Attacks

Page 10: Ethical hacking - Good Aspect of Hacking

India’s Ethical Hackers

Ankit Fadia Pranav Mistry Sunny Vaghela Vivek Ramchandran Koushik Dutta Aseem Jakhar Sai Satish Falgun Rathod Rahul Tyagi

Page 11: Ethical hacking - Good Aspect of Hacking

Some Cases of Hacking

Sony - Around 77 million users of Sony’s Play station network could have had their information stolen by hackers in April 2011.

RSA Security - In March 2011, RSA Security was hacked when a spoof email containing an infected Excel spread sheet tricked employees into allowing hackers to access the system.

InfraGard Atlanta - As an FBI partner, you would imagine InfraGard Atlanta to have the most up-to-date Internet security available. However, in June 2011 the company was hacked and 180 usernames and passwords were stolen.

Gmail - The Gmail accounts of Chinese human activists were hacked, suggesting that the Chinese government masterminded this attack, especially because of the widespread restrictions within the country.

Page 12: Ethical hacking - Good Aspect of Hacking

Skills of an ethical hacker

Routers- knowledge of routers, routing protocols and access control lists. Microsoft- skills in operation , configuration and management. Linux- knowledge of Linux/Unix; security setting, configuration, and services.

Firewalls- configuration, & operation of  intrusion detection systems.

Page 13: Ethical hacking - Good Aspect of Hacking

Skills of an ethical hacker

Network protocols- TCP/IP ; how they function and can be manipulated. Project management- knowledge of leading, planning, organizing, and controlling a penetration tests systems.

Page 14: Ethical hacking - Good Aspect of Hacking

www.google.com www.wikipedia.org

  www.hackingloops.com   www.wolframalpha.com

Bibliography

Page 15: Ethical hacking - Good Aspect of Hacking

Thank You

All Hackers are not BADWell Have Nice Day to All of You

Page 16: Ethical hacking - Good Aspect of Hacking

Presented By

Divy Singh Rathore

www.techwila.com